Login / Signup
An Authentication Scheme Based on the Twisted Conjugacy Problem.
Vladimir Shpilrain
Alexander Ushakov
Published in:
ACNS (2008)
Keyphrases
</>
authentication scheme
window search
smart card
image encryption
secret key
user authentication
public key
security analysis
security flaws
authentication protocol
image authentication
real time
response time
key management